pgpfan:ledowngrade
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| pgpfan:ledowngrade [2025/11/03 19:59] – [Two Pet Peeves] Spelling. b.walzer | pgpfan:ledowngrade [2026/03/23 19:12] (current) – [Politics] New point about chunk size used for POC. b.walzer | ||
|---|---|---|---|
| Line 71: | Line 71: | ||
| As has been pointed out(([[https:// | As has been pointed out(([[https:// | ||
| - | The vulnerabilties | + | The vulnerabilities |
| That is literally what is happening here. The attack from the paper requires that the user or the user's client receive a message, decrypt it and then send it back to the attacker. For this case there is no point in worrying about the second vulnerability before resolving the first. Once you have resolved the first then the second goes away. All that cool stuff about using an decryption function as a encryption function never has a chance to be meaningful. So it seems that there is no attack here against the LibrePGP OCB mode that could ever be considered significant in some way. | That is literally what is happening here. The attack from the paper requires that the user or the user's client receive a message, decrypt it and then send it back to the attacker. For this case there is no point in worrying about the second vulnerability before resolving the first. Once you have resolved the first then the second goes away. All that cool stuff about using an decryption function as a encryption function never has a chance to be meaningful. So it seems that there is no attack here against the LibrePGP OCB mode that could ever be considered significant in some way. | ||
| Line 107: | Line 107: | ||
| If you end up believing that the attack from the paper is a valid vulnerability then you might think that the extra operation is worth the cost. Otherwise you might not. | If you end up believing that the attack from the paper is a valid vulnerability then you might think that the extra operation is worth the cost. Otherwise you might not. | ||
| + | |||
| + | During the pre-schism phase of the standards process there was huge, never ending, debate about the amount of data processed between integrity checks (" | ||
| =====An Unwarranted Claim Against SEIPD (OCFB-MDC)===== | =====An Unwarranted Claim Against SEIPD (OCFB-MDC)===== | ||
| Line 126: | Line 128: | ||
| '' | '' | ||
| - | I don't get any great amount of credit for spotting this. That is because I know that this exact same misunderstanding has happened before. When the security of the SEIPD encryption mode was being evaluated it turned out that the specification omitted the MAC key. So there was more discussion about the attack engendered by this omission than there might have been otherwise(([[https:// | + | I don't get any great amount of credit for spotting this. That is because I know that this exact same misunderstanding has happened before. When the security of the SEIPD encryption mode was being evaluated it turned out that the specification omitted the MAC key. So there was more discussion about the attack engendered by this omission than there might have been otherwise(([[https:// |
| A definite statement is required here: this paper does not show that the SEIPD encryption mode does not achieve CCA2 security((I was able to inform one of the authors about the error via an email exchange.)). | A definite statement is required here: this paper does not show that the SEIPD encryption mode does not achieve CCA2 security((I was able to inform one of the authors about the error via an email exchange.)). | ||
pgpfan/ledowngrade.1762199966.txt.gz · Last modified: by b.walzer
